Filters








107,453 Hits in 4.3 sec

Can clone detection support test comprehension?

Benedikt Hauptmann, Maximilian Junker, Sebastian Eder, Elmar Juergens, Rudolf Vaas
2012 2012 20th IEEE International Conference on Program Comprehension (ICPC)  
Redundancies in tests may significantly decrease their understandability. Clone detection is a technique to find similar parts in software artifacts.  ...  Tests are central artifacts of software systems. Therefore, understanding tests is essential for activities such as maintenance, test automation, and efficient execution.  ...  Second, we exemplarily investigate how far clone detection can support test comprehension by quantifying the benefit for test suite optimization and test automation.  ... 
doi:10.1109/icpc.2012.6240490 dblp:conf/iwpc/HauptmannJEJV12 fatcat:m5s34g4rbvgwrjdm2n6ezen7re

CGHPRO -- a comprehensive data analysis tool for array CGH

Wei Chen, Fikret Erdogan, H-Hilger Ropers, Steffen Lenzner, Reinhard Ullmann
2005 BMC Bioinformatics  
, loss or gain in the test DNA can be indicated from spots showing aberrant signal intensity ratios.  ...  Intensity ratios of each clone can be plotted in a size-dependent manner along the chromosome ideograms.  ...  Acknowledgements This work was supported by the Nationales Genomforschungsnetzwerk, grant 01GR0203.  ... 
doi:10.1186/1471-2105-6-85 pmid:15807904 pmcid:PMC1274268 fatcat:dai7bg4zcffjjnnd6le5wsgtpi

Discovering Comprehension Pitfalls in Class Hierarchies

Petru Florin Mihancea, Radu Marinescu
2009 2009 13th European Conference on Software Maintenance and Reengineering  
The experimental results presented in this paper, based on three medium-sized systems, indicate that the identified comprehension pitfalls and the approach used to detect them are a promising support for  ...  We define these as comprehension pitfalls. Furthermore, the paper describes a metric-based approach aimed to automatically detect such situations in code.  ...  This work is supported by CNCSIS under the research grants TD (Code 126/2008) and PN2 (357/1. 10.2007).  ... 
doi:10.1109/csmr.2009.31 dblp:conf/csmr/MihanceaM09 fatcat:ac7evde3vnap5atjbl37x5l7va

A Comprehensive Drosophila melanogaster Transcription Factor Interactome

Leila Shokri, Sachi Inukai, Antonina Hafner, Kathryn Weinand, Korneel Hens, Anastasia Vedenko, Stephen S. Gisselbrecht, Riccardo Dainese, Johannes Bischof, Edy Furger, Jean-Daniel Feuz, Konrad Basler (+2 others)
2019 Cell Reports  
If the proteins interact, then YFP is reconstituted and the YFP fluorescent signal can be detected (Hu et al., 2002; Pusch et al., 2011) .  ...  There is evidence in MasterNet supporting 74 of our 1,983 Y2H PPIs.  ...  Of 12 tested TF pairs from the scrambled PRS pairings, none were positive by either MITOMI or BiFC, supporting the specificity of these assays.  ... 
doi:10.1016/j.celrep.2019.03.071 pmid:30995488 pmcid:PMC6485956 fatcat:nuw6p7v5gbbafghmpwac3vjkae

Digital Image Tamper Detection Techniques - A Comprehensive Study [article]

Minati Mishra, Flt. Lt. Dr. M. C. Adhikary
2013 arXiv   pre-print
This paper gives a brief history of image tampering and a state-of-the-art review of the tamper detection techniques.  ...  For a long time, those were accepted as proves of evidences in varied fields such as journalism, forensic investigations, military intelligence, scientific research and publications, crime detection and  ...  When it is done with care, it becomes almost impossible to detect the clone visually and since the cloned region can be of any shape and size and can be located anywhere in the image, it is not computationally  ... 
arXiv:1306.6737v1 fatcat:om7tabysz5aq3og53p2lpznkwa

Comprehensive antibiotic-linked mutation assessment by resistance mutation sequencing (RM-seq)

Romain Guérillot, Lucy Li, Sarah Baines, Brian Howden, Mark B. Schultz, Torsten Seemann, Ian Monk, Sacha J. Pidot, Wei Gao, Stefano Giulieri, Anders Gonçalves da Silva, Anthony D'Agata (+4 others)
2018 Genome Medicine  
RM-seq will facilitate comprehensive detection, characterisation and surveillance of resistant bacterial populations (https://github.com/rguerillot/RM-seq).  ...  The sensitive detection of very low-frequency resistant sub-populations permits characterisation of antibiotic-linked mutational repertoires in vitro and detection of rare resistant populations during  ...  We show here that RM-seq can be used to detect very low frequency sub-population of resistant clones from patients infected by M. tuberculosis.  ... 
doi:10.1186/s13073-018-0572-z pmid:30165908 fatcat:lu6rwjr3azb7xcckrdlckpvhvi

A Comprehensive Study of Finding Copy-and-Paste Clones from Program Source Codes

Kamran Khan, Saif Ur Rehman, Kamran Aziz, Simon Fong
2014 Journal of Emerging Technologies in Web Intelligence  
In this study, we will provide comprehensive details of the various clone detection techniques proposed so far.  ...  In our future work we will propose our own clone detection technique that will more efficient and accurate in terms of code clone detection from multiple programming languages. I.  ...  Since this approach can detects maximum programming defects in one phase that is why testing time is very much optimized with this method.  ... 
doi:10.4304/jetwi.6.1.111-118 fatcat:3ol2ldjdlvbw7kujag5xkc6ati

Agec: An execution-semantic clone detection tool

Toshihiro Kamiya
2013 2013 21st International Conference on Program Comprehension (ICPC)  
The strengths of the tool are: static analysis (no need for test cases), detection of clones of deeply nested invocations, and Map-Reduce ready detection algorithms for scalability.  ...  traces, (2) detects the same n-grams from distinct places of the bytecode, and (3) then reports these ngrams as code clones.  ...  However, which entities can become such "unit" entities is a tough question to answer.  ... 
doi:10.1109/icpc.2013.6613854 dblp:conf/iwpc/Kamiya13 fatcat:byetxeqwo5f73e7dnoou75ra3y

Prioritizing maintainability defects based on refactoring recommendations

Daniela Steidl, Sebastian Eder
2014 Proceedings of the 22nd International Conference on Program Comprehension - ICPC 2014  
Our approach recommends to remove quality defects, exemplary code clones and long methods, which are easy to refactor and, thus, provides developers a first starting point for quality improvement.  ...  Clone Detection.  ...  This approach uses similar data flow heuristics and static analyses to detect clones which can be refactored.  ... 
doi:10.1145/2597008.2597805 dblp:conf/iwpc/SteidlE14 fatcat:cdkudxrmkvbztiejq7fr7v5bai

CnP: Towards an environment for the proactive management of copy-and-paste programming

Daqing Hou, Patricia Jablonski, Ferosh Jacob
2009 2009 IEEE 17th International Conference on Program Comprehension  
In addition to what clone detection-based tools can offer, more automated support is needed to better assist programmers in these activities.  ...  In this paper, we introduce a toolkit CnP that is aimed to support and manage clones proactively as they are created and evolved.  ...  Proactive support can benefit from clone detection tools, but does not rely on them to function.  ... 
doi:10.1109/icpc.2009.5090049 dblp:conf/iwpc/HouJJ09 fatcat:ay5uniuyr5gonlqykrsoohm5dm

Aiding Software Maintenance with Copy-and-Paste Clone-Awareness

Patricia Jablonski, Daqing Hou
2010 2010 IEEE 18th International Conference on Program Comprehension  
We tested these hypotheses with a user study and present our results.  ...  We believe that the clone-awareness that the tool provides can help programmers benefit from this clone information during debugging and modification tasks, develop software more efficiently, and prevent  ...  A related tool, VACI, detects contexts and identifiers, and then forms translation classes that can be used to detect an inconsistency in naming [13] .  ... 
doi:10.1109/icpc.2010.22 dblp:conf/iwpc/JablonskiH10a fatcat:umofm63spbetveghdhmftjqmdm

Comprehensive antibiotic-linked mutation assessment by Resistance Mutation Sequencing (RM-seq) [article]

Romain Guérillot, Lucy Li, Sarah Baines, Brian O Howden, Mark Schultz, Torsten Seemann, Ian Monk, Sacha J Pidot, Wei Gao, Stefano Giulieri, Anders Gonçalves da Silva, Anthony D'Agata (+4 others)
2018 bioRxiv   pre-print
Targeted mutagenesis and phenotypic resistance testing was used to validate the technique and demonstrate that RM-seq can be used to link subsets of mutations with clinical resistance breakpoints at high-throughput  ...  using large pools of in vitro selected resistant clones.  ...  We show here that RM-seq can be used 540 to detect very low frequency sub-population of resistant clones from patients infected by M. 541 tuberculosis.  ... 
doi:10.1101/257915 fatcat:jshrj6ew5bgrfa3rrytcgcpoka

Insight into a method co-change pattern to identify highly coupled methods: An empirical study

Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider
2013 2013 21st International Conference on Program Comprehension (ICPC)  
We believe that clone refactoring can help us minimize evolutionary coupling among methods.  ...  According to our in-depth investigation on hundreds of revisions of seven open-source software systems considering three types of clones (Type 1, Type 2, Type 3), our identified pattern helps us detect  ...  of program comprehension.  ... 
doi:10.1109/icpc.2013.6613838 dblp:conf/iwpc/MondalRS13 fatcat:2flm3yre4fcx5p7nyyeybaimxm

Applying clone change notification system into an industrial development process

Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano
2013 2013 21st International Conference on Program Comprehension (ICPC)  
Programmers tend to write code clones unintentionally even in the case that they can easily avoid them.  ...  So far, several studies performed on the analysis of clone evolution in OSS.  ...  This work is partially supported by JSPS, Grant-in-Aid for Scientific Research (A) (21240002).  ... 
doi:10.1109/icpc.2013.6613848 dblp:conf/iwpc/YamanakaCYIS13 fatcat:6r2ux6425vbx3ovi6qj6a3i2a4

Comprehensive Review of Cybercrime Detection Techniques

Wadha Abdullah Al-Khater, Somaya Al-Ma'adeed, Abdulghani Ali Ahmed, Ali Safaa Sadiq, Muhammad Khurram Khan
2020 IEEE Access  
Finally, it provides recommendations for the development of a cybercrime detection model that can detect cybercrimes effectively compared with the existing techniques.  ...  Thus, this study intensively reviews cybercrime detection and prevention techniques.  ...  Several classifiersnamely, the support vector machine, naïve Bayes, KNN, and decision tree-were tested to determine the best classifier.  ... 
doi:10.1109/access.2020.3011259 fatcat:m2nbqwxqvvabfea5fbtzvjuoey
« Previous Showing results 1 — 15 out of 107,453 results